Hacking
Donald A. Tevault
Threat Modeling Best Practices. Proven frameworks and practical techniques to secure modern systems
Derek Fisher
Threat Modeling Best Practices. Proven frameworks and practical techniques to secure modern systems
Derek Fisher
Threat Modeling Best Practices. Proven frameworks and practical techniques to secure modern systems
Derek Fisher
Threat Modeling Best Practices. Proven frameworks and practical techniques to secure modern systems
Derek Fisher
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
Brett Crawley, Adam Shostack
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
Brett Crawley, Adam Shostack
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
Brett Crawley, Adam Shostack
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
Brett Crawley, Adam Shostack
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
Brett Crawley, Adam Shostack
Dr. Paul Duplys, Dr. Roland Schmitz
Dr. Paul Duplys, Dr. Roland Schmitz
Dr. Paul Duplys, Dr. Roland Schmitz
Dr. Paul Duplys, Dr. Roland Schmitz
Dr. Paul Duplys, Dr. Roland Schmitz
Tokenomics. The Crypto Shift of Blockchains, ICOs, and Tokens
Sean Au, Thomas Power(GBP)
Twoje bezpieczeństwo w świecie cyber i AI 2026 Część 2 Cyberhigiena
Dariusz Gołębiowski
Twoje bezpieczeństwo w świecie cyber i AI 2026 Część 3 Dziecko i Ty
Dariusz Gołębiowski
Twoje bezpieczeństwo w świecie cyber i AI Część 1 Wprowadzenie 2026
Dariusz Gołębiowski
Twoje dziecko w sieci. Przewodnik po cyfrowym świecie dla czasami zdezorientowanych rodziców
Agnieszka E. Taper
Zhassulan Zhussupov
Zhassulan Zhussupov
Zhassulan Zhussupov
Zhassulan Zhussupov
Parth Ghiya